Analysis
-
max time kernel
4s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 19:37
Behavioral task
behavioral1
Sample
b303cf21786ffb3a53bcabd6e4f0c810N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b303cf21786ffb3a53bcabd6e4f0c810N.exe
Resource
win10v2004-20240802-en
General
-
Target
b303cf21786ffb3a53bcabd6e4f0c810N.exe
-
Size
2.0MB
-
MD5
b303cf21786ffb3a53bcabd6e4f0c810
-
SHA1
213fa018f83eb7017cf22da7679df37b055ddf98
-
SHA256
e0165e0bc92d206d65c35c5f5859dff9d8b40a5feec7500146732be859551665
-
SHA512
8d1d3b2a7653a2c037725d068792e532f18f8d407ed97f7aa1b4b2ba9492d20cbf145a13f8238f1be8aefa875acdb8bbb6f07a898e1d9d3a7b5d02f85c024daf
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYs:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YG
Malware Config
Extracted
azorult
http://0x21.in:8000/_az/
Extracted
quasar
1.3.0.0
EbayProfiles
5.8.88.191:443
sockartek.icu:443
QSR_MUTEX_0kBRNrRz5TDLEQouI0
-
encryption_key
MWhG6wsClMX8aJM2CVXT
-
install_name
winsock.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
win defender run
-
subdirectory
SubDir
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Quasar payload 4 IoCs
resource yara_rule behavioral2/files/0x0007000000023483-12.dat family_quasar behavioral2/memory/4976-29-0x0000000000520000-0x000000000057E000-memory.dmp family_quasar behavioral2/files/0x0007000000023485-45.dat family_quasar behavioral2/memory/4868-92-0x0000000000550000-0x000000000075A000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation b303cf21786ffb3a53bcabd6e4f0c810N.exe -
Executes dropped EXE 2 IoCs
pid Process 3216 vnc.exe 4976 windef.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\j: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\m: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\n: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\z: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\y: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\b: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\h: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\p: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\t: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\x: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\u: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\w: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\a: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\e: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\i: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\k: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\l: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\o: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\q: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\r: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\s: b303cf21786ffb3a53bcabd6e4f0c810N.exe File opened (read-only) \??\v: b303cf21786ffb3a53bcabd6e4f0c810N.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023485-45.dat autoit_exe behavioral2/memory/4868-92-0x0000000000550000-0x000000000075A000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1916 set thread context of 2548 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 4468 3216 WerFault.exe 85 3392 4952 WerFault.exe 110 4468 1112 WerFault.exe 99 776 1956 WerFault.exe 128 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b303cf21786ffb3a53bcabd6e4f0c810N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b303cf21786ffb3a53bcabd6e4f0c810N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windef.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1332 PING.EXE 2500 PING.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1332 PING.EXE 2500 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 116 schtasks.exe 1108 schtasks.exe 2764 schtasks.exe 2432 schtasks.exe 2312 schtasks.exe 3184 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4976 windef.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1916 wrote to memory of 3216 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 85 PID 1916 wrote to memory of 3216 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 85 PID 1916 wrote to memory of 3216 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 85 PID 3216 wrote to memory of 3488 3216 vnc.exe 88 PID 3216 wrote to memory of 3488 3216 vnc.exe 88 PID 1916 wrote to memory of 4976 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 89 PID 1916 wrote to memory of 4976 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 89 PID 1916 wrote to memory of 4976 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 89 PID 1916 wrote to memory of 2548 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 90 PID 1916 wrote to memory of 2548 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 90 PID 1916 wrote to memory of 2548 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 90 PID 1916 wrote to memory of 2548 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 90 PID 1916 wrote to memory of 2548 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 90 PID 3216 wrote to memory of 3488 3216 vnc.exe 88 PID 1916 wrote to memory of 116 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 93 PID 1916 wrote to memory of 116 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 93 PID 1916 wrote to memory of 116 1916 b303cf21786ffb3a53bcabd6e4f0c810N.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b303cf21786ffb3a53bcabd6e4f0c810N.exe"C:\Users\Admin\AppData\Local\Temp\b303cf21786ffb3a53bcabd6e4f0c810N.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 5483⤵
- Program crash
PID:4468
-
-
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4976 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1108
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"3⤵PID:1112
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jDfjo2BkqDba.bat" "4⤵PID:116
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:3944
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1332
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"5⤵PID:1492
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 22644⤵
- Program crash
PID:4468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b303cf21786ffb3a53bcabd6e4f0c810N.exe"C:\Users\Admin\AppData\Local\Temp\b303cf21786ffb3a53bcabd6e4f0c810N.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3216 -ip 32161⤵PID:220
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exeC:\Users\Admin\btpanui\SystemPropertiesPerformance.exe1⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵PID:4952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵PID:2460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 5203⤵
- Program crash
PID:3392
-
-
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵PID:2292
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2312
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"3⤵PID:1956
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QQFARX2hlyJw.bat" "4⤵PID:3300
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:3392
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2500
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"5⤵PID:396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 22724⤵
- Program crash
PID:776
-
-
-
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"2⤵PID:992
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- Scheduled Task/Job: Scheduled Task
PID:2432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4952 -ip 49521⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1112 -ip 11121⤵PID:3584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1956 -ip 19561⤵PID:4792
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4992
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
701B
MD55de8527438c860bfa3140dc420a03e52
SHA1235af682986b3292f20d8d71a8671353f5d6e16d
SHA256d9d92cd6e7a4507912965138b8d1eabb3f188f4dfcb61115ee99dc2c0fd43a92
SHA51277c3a774a2235c55ad520f1bf0c71fa3d3f0e7cf478a78e0d4dd6d253ee12a9859acc9ee822664467387788a2655a18373c8fcf08ea0d001549d3d4391b00bf8
-
Filesize
208B
MD5c4d57a570b99d4527cdce3ad84aed3e4
SHA10c9a7771de903e94bd08852b9867803dad6c1b08
SHA256bd093f6cdf8969055b0a8c77832adb1f7066662341f7edf7606a6b7b34efbbe2
SHA512a11c4e2f1c07b511446c4c7f0c4190097c522b43fe1023665297cf5c05c5c85b707795d70f0f9361b9bdbacacae9e2f18b4c9877108e5e39423c1a1e53397f05
-
Filesize
208B
MD515aeab7ba2cb771f32af1f6f3ff0210e
SHA1a3b12d9d87e965fbbe050f4628c04d61881ec74d
SHA256e717952278fa87684eb92356d6834f0cd70da2c76640dc634b9ee323b018d7cf
SHA51299aefffeb0c9c2ea701a878d2fd36b02ba832a654e4c0c96cf0b4f91f031197fd212a6bf7c2ddda6849f12e9f5a7b0e839a83c8aecbc879c3b038b59683762c7
-
Filesize
405KB
MD5b8ba87ee4c3fc085a2fed0d839aadce1
SHA1b3a2e3256406330e8b1779199bb2b9865122d766
SHA2564e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4
SHA5127a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2
-
Filesize
349KB
MD5b4a202e03d4135484d0e730173abcc72
SHA101b30014545ea526c15a60931d676f9392ea0c70
SHA2567050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9
SHA512632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb
-
Filesize
224B
MD5244fc86d93a153a6adadfeedfd8bc732
SHA1c8c92a56d303a930c8dde189907441e2a23f40ef
SHA2567368b04dadb6c0c70a40a22255fd0b189690f39ea5f75775cc9bd85a01ddfd26
SHA512cd9b857178307c4e443610db8188c9343dd556baf0746e4873a8aceb1ece0eba0295f778b78e7cceab8765d0299f9627393ed372918c3dae7c2d43a4a9543731
-
Filesize
2.0MB
MD5e4ecd84e7d01af20b209a28d7bc7884a
SHA19403a8938ba0f249606bfab49ba44c03620467d1
SHA25608cf400ba37d2153d855e96fe1390962be16707e41f23b776105084ef1bc364e
SHA512dea5c106987b3b7b43d245581399c13047266ca30ab8f210bdf880a9610b7b4bdaecb2e2cc790792f4144116b4ea812aec41e8ce5bc54e3100f7d170f2896e45